@@ -23,12 +23,41 @@ We truncate at 63 chars because some Kubernetes name fields are limited to this
23
23
{ {- end -} }
24
24
{ {- end -} }
25
25
26
+ { {- define " docker-registry.secretName" -} }
27
+ { {- if .Values.secrets.existingSecret } }
28
+ { {- .Values.secrets.existingSecret } }
29
+ { {- else } }
30
+ { {- template " docker-registry.fullname" . } }-secret
31
+ { {- end } }
32
+ { {- end } }
33
+
34
+ { {- define " docker-registry.azureSecretName" -} }
35
+ { {- if .Values.secrets.azure.existingSecret } }
36
+ { {- .Values.secrets.azure.secretRef } }
37
+ { {- else } }
38
+ { {- template " docker-registry.fullname" . } }-secret
39
+ { {- end } }
40
+ { {- end } }
41
+
42
+ { {- define " docker-registry.swiftSecretName" -} }
43
+ { {- if .Values.secrets.swift.existingSecret } }
44
+ { {- .Values.secrets.swift.secretRef } }
45
+ { {- else } }
46
+ { {- template " docker-registry.fullname" . } }-secret
47
+ { {- end } }
48
+ { {- end } }
49
+
26
50
{ {- define " docker-registry.envs" -} }
27
51
- name: REGISTRY_HTTP_SECRET
28
52
valueFrom:
29
53
secretKeyRef:
30
- name: { { template " docker-registry.fullname" . } }-secret
54
+ name: { { template " docker-registry.secretName" . } }
55
+ { {- if and .Values.secrets.haSharedSecretKey .Values.secrets.existingSecret } }
56
+ key: { {- .Values.secrets.haSharedSecretKey } }
57
+ { {- else } }
31
58
key: haSharedSecret
59
+ { {- end } }
60
+ { {- end } }
32
61
33
62
{ {- if .Values.secrets.htpasswd } }
34
63
- name: REGISTRY_AUTH
@@ -53,18 +82,30 @@ We truncate at 63 chars because some Kubernetes name fields are limited to this
53
82
- name: REGISTRY_STORAGE_AZURE_ACCOUNTNAME
54
83
valueFrom:
55
84
secretKeyRef:
56
- name: { { template " docker-registry.fullname" . } }-secret
85
+ name: { { template " docker-registry.azureSecretName" . } }
86
+ { {- if and .Values.secrets.azure.azureAccountNameKey .Values.secrets.azure.existingSecret } }
87
+ key: { {- .Values.secrets.azure.accountNameKey } }
88
+ { {- else } }
57
89
key: azureAccountName
90
+ { {- end } }
58
91
- name: REGISTRY_STORAGE_AZURE_ACCOUNTKEY
59
92
valueFrom:
60
93
secretKeyRef:
61
- name: { { template " docker-registry.fullname" . } }-secret
94
+ name: { { template " docker-registry.azureSecretName" . } }
95
+ { {- if and .Values.secrets.azure.azureAccountNameKey .Values.secrets.azure.existingSecret } }
96
+ key: { {- .Values.secrets.azure.accountKeyKey } }
97
+ { {- else } }
62
98
key: azureAccountKey
99
+ { {- end } }
63
100
- name: REGISTRY_STORAGE_AZURE_CONTAINER
64
101
valueFrom:
65
102
secretKeyRef:
66
- name: { { template " docker-registry.fullname" . } }-secret
103
+ name: { { template " docker-registry.azureSecretName" . } }
104
+ { {- if and .Values.secrets.azure.containerKey .Values.secrets.azure.existingSecret } }
105
+ key: { {- .Values.secrets.azure.containerKey } }
106
+ { {- else } }
67
107
key: azureContainer
108
+ { {- end } }
68
109
{ {- else if eq .Values.storage " s3" } }
69
110
- name: REGISTRY_STORAGE_S3_REGION
70
111
value: { { required " .Values.s3.region is required" .Values.s3.region } }
@@ -74,12 +115,12 @@ We truncate at 63 chars because some Kubernetes name fields are limited to this
74
115
- name: REGISTRY_STORAGE_S3_ACCESSKEY
75
116
valueFrom:
76
117
secretKeyRef:
77
- name: { { if .Values.secrets.s3.secretRef } }{ { .Values.secrets.s3.secretRef } }{ { else } }{ { template " docker-registry.fullname " . } }-secret { { end } }
118
+ name: { { if .Values.secrets.s3.secretRef } }{ { .Values.secrets.s3.secretRef } }{ { else } }{ { template " docker-registry.secretName " . } }{ { end } }
78
119
key: s3AccessKey
79
120
- name: REGISTRY_STORAGE_S3_SECRETKEY
80
121
valueFrom:
81
122
secretKeyRef:
82
- name: { { if .Values.secrets.s3.secretRef } }{ { .Values.secrets.s3.secretRef } }{ { else } }{ { template " docker-registry.fullname " . } }-secret { { end } }
123
+ name: { { if .Values.secrets.s3.secretRef } }{ { .Values.secrets.s3.secretRef } }{ { else } }{ { template " docker-registry.secretName " . } }{ { end } }
83
124
key: s3SecretKey
84
125
{ {- end -} }
85
126
@@ -119,13 +160,21 @@ We truncate at 63 chars because some Kubernetes name fields are limited to this
119
160
- name: REGISTRY_STORAGE_SWIFT_USERNAME
120
161
valueFrom:
121
162
secretKeyRef:
122
- name: { { template " docker-registry.fullname" . } }-secret
163
+ name: { { template " docker-registry.swiftSecretName" . } }
164
+ { {- if and .Values.secrets.swift.usernameKey .Values.secrets.swift.secretRef -} }
165
+ key: { {- .Values.secrets.swift.usernameKey -} }
166
+ { {- else -} }
123
167
key: swiftUsername
168
+ { {- end -} }
124
169
- name: REGISTRY_STORAGE_SWIFT_PASSWORD
125
170
valueFrom:
126
171
secretKeyRef:
127
- name: { { template " docker-registry.fullname" . } }-secret
172
+ name: { { template " docker-registry.swiftSecretName" . } }
173
+ { {- if and .Values.secrets.swift.passwordKey .Values.secrets.swift.secretRef -} }
174
+ key: { {- .Values.secrets.swift.passwordKey -} }
175
+ { {- else -} }
128
176
key: swiftPassword
177
+ { {- end -} }
129
178
- name: REGISTRY_STORAGE_SWIFT_CONTAINER
130
179
value: { { required " .Values.swift.container is required" .Values.swift.container } }
131
180
{ {- end -} }
@@ -136,13 +185,21 @@ We truncate at 63 chars because some Kubernetes name fields are limited to this
136
185
- name: REGISTRY_PROXY_USERNAME
137
186
valueFrom:
138
187
secretKeyRef:
139
- name: { { if .Values.proxy.secretRef } }{ { .Values.proxy.secretRef } }{ { else } }{ { template " docker-registry.fullname" . } }-secret{ { end } }
188
+ name: { { if .Values.proxy.secretRef } }{ { .Values.proxy.secretRef } }{ { else } }{ { template " docker-registry.secretName" . } }{ { end } }
189
+ { {- if and .Values.proxy.proxyUsernameKey .Values.proxy.secretRef -} }
190
+ key: { {- .Values.proxy.proxyUsernameKey -} }
191
+ { {- else -} }
140
192
key: proxyUsername
193
+ { {- end -} }
141
194
- name: REGISTRY_PROXY_PASSWORD
142
195
valueFrom:
143
196
secretKeyRef:
144
- name: { { if .Values.proxy.secretRef } }{ { .Values.proxy.secretRef } }{ { else } }{ { template " docker-registry.fullname" . } }-secret{ { end } }
197
+ name: { { if .Values.proxy.secretRef } }{ { .Values.proxy.secretRef } }{ { else } }{ { template " docker-registry.secretName" . } }{ { end } }
198
+ { {- if and .Values.proxy.proxyPasswordKey .Values.proxy.secretRef -} }
199
+ key: { {- .Values.proxy.proxyPasswordKey -} }
200
+ { {- else -} }
145
201
key: proxyPassword
202
+ { {- end -} }
146
203
{ {- end -} }
147
204
148
205
{ {- if .Values.persistence.deleteEnabled } }
@@ -154,8 +211,6 @@ We truncate at 63 chars because some Kubernetes name fields are limited to this
154
211
{ { toYaml . } }
155
212
{ {- end -} }
156
213
157
- { {- end -} }
158
-
159
214
{ {- define " docker-registry.volumeMounts" -} }
160
215
- name: "{ { template " docker-registry.fullname" . } }-config"
161
216
mountPath: { { .Values.configPath } }
@@ -191,10 +246,15 @@ We truncate at 63 chars because some Kubernetes name fields are limited to this
191
246
{ {- if .Values.secrets.htpasswd } }
192
247
- name: auth
193
248
secret:
194
- secretName: { { template " docker-registry.fullname " . } }-secret
249
+ secretName: { { template " docker-registry.secretName " . } }
195
250
items:
251
+ { {- if and .Values.secrets.htpasswdKey .Values.secrets.existingSecret } }
252
+ - key: { {- .Values.secrets.htpasswdKey } }
253
+ path: htpasswd
254
+ { {- else } }
196
255
- key: htpasswd
197
256
path: htpasswd
257
+ { {- end } }
198
258
{ {- end } }
199
259
200
260
{ {- if eq .Values.storage " filesystem" } }
0 commit comments